MalwareBytes

More PayPal emails hijacked to deliver tech support scams


Scammers have found another way to get deceptive messages delivered through PayPal’s legitimate services.

In December 2025, we reported that PayPal closed a loophole that let scammers send real emails with fake purchase notices.

In those cases, scammers created a PayPal subscription and then paused it, which triggered PayPal’s genuine “Your automatic payment is no longer active” notification. They also set up a fake subscriber account, likely a Google Workspace mailing list, which automatically forwarded any email it received to all other group members.

Recently, ConsumerWorld.org alerted us that tech support scammers have found a way to manipulate the subject line of PayPal payment notifications.

This is a screenshot of the example they sent us.

Screenshot email from PayPal scammers

As you can see, the email comes from service@paypal.com. It wasn’t spoofed, which means it passes standard security checks (DKIM, SPF, DMARC).

While the body of the email says that you received a payment of ¥1 JPY (a whopping $0.0063), the subject line tells a different story:

“Pending charge of USD 987.90 for account activation. Questions? Call-(888) 607-0685.”

As an extra bonus for the scammers, the email contains personalized details—the recipient’s actual name and a real transaction ID.

The number in the subject line is not PayPal’s. The legitimate contact number appears inside the email.

the fake and the real PayPal number
The fake (red) and the real (green) PayPal number

Scam or legit? Scam Guard knows.


The intention of the email is straightforward.

Recipients think:

  1. “Oh no! There’s a pending charge for $987.90.”
  2. “The amount doesn’t match what I see in the email body—that’s weird and scary.”
  3. “I need to call this number immediately to dispute this charge.”

They call the number in the subject line, only to reach tech support scammers.

These scammers pretend to be PayPal support and may try to:

  • Get you to “verify” payment methods
  • Collect banking details
  • Convince you to install remote access tools
  • Take control of accounts or devices
  • All of the above

    How the subject line is altered is still unclear. Based on PayPal’s documented email behavior, subject lines are typically fixed and not meant to include arbitrary free text or phone numbers. Our findings indicate that the subject line was already weaponized at the point PayPal’s systems signed the email. If someone along the way had rewritten the subject, the dkim=pass header.d=paypal.com result would likely fail.

    One possibility is that the scammer abused PayPal’s note or remittance field in a way that surfaces in certain payout templates, including the subject line and HTML </code>, even though normal merchant payment‑received emails don’t allow arbitrary subjects.</p><figure class="wp-block-image aligncenter size-full"><img data-lazyloaded="1" src="data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI2MjEiIGhlaWdodD0iMTEzIiB2aWV3Qm94PSIwIDAgNjIxIDExMyI+PHJlY3Qgd2lkdGg9IjEwMCUiIGhlaWdodD0iMTAwJSIgc3R5bGU9ImZpbGw6I2NmZDRkYjtmaWxsLW9wYWNpdHk6IDAuMTsiLz48L3N2Zz4=" decoding="async" width="621" height="113" data-src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2026/04/title_change.png" alt="The title tag matches the subject line of the email" class="wp-image-406674" data-srcset="https://www.malwarebytes.com/wp-content/uploads/sites/2/2026/04/title_change.png 621w, https://www.malwarebytes.com/wp-content/uploads/sites/2/2026/04/title_change.png?resize=300,55 300w" data-sizes="(max-width: 621px) 100vw, 621px"/><figcaption class="wp-element-caption">The title tag matches the subject line of the email</figcaption></figure><p>We have contacted PayPal for comment and will update this post if we hear back.</p><h2 id="section-how-to-avoid-paypal-scams">How to avoid PayPal scams</h2><p>The best way to stay safe is to stay informed about the tricks scammers use. Learn to spot the red flags that almost always give away scams and phishing emails, and remember:</p><ul class="wp-block-list"><li><strong>Use verified, official ways to contact companies. </strong>Don’t call numbers listed in suspicious emails or attachments.</li><li><strong>Beware of someone wanting to connect to your computer remotely. </strong>One of the tech support scammer’s biggest weapons is their ability to connect remotely to their victims. If they do this, they essentially have total access to all of your files and folders.</li><li><strong>Report suspicious emails to PayPal.</strong> Send the email to <code>phishing@paypal.com</code> to support their investigations.</li></ul><p>If you’ve fallen victim to a tech support scam:</p><ul class="wp-block-list"><li><strong>Paid the scammer? </strong>Contact your bank or card provider and let them know what’s happened. You can also file a complaint with the FTC or your local law enforcement, depending on your region.</li><li><strong>Shared a password? </strong>Change it anywhere it’s used. Consider using a password manager and enable 2FA for important accounts.</li><li><strong>Gave access to your device?</strong> Run a full security scan. If scammers had access to your system, they may have planted a backdoor so they can revisit whenever they feel like it. Malwarebytes can remove these and other software left behind by scammers.</li><li><strong>Watch your accounts: </strong>Keep an eye out for unexpected payments or suspicious charges on your credit cards and bank accounts.</li><li><strong>Be wary of suspicious emails. </strong>If you’ve fallen for one scam, they may target you again.</li></ul><p>Pro tip: <strong>Malwarebytes Scam Guard recognized this email as a call back scam. </strong>Upload any suspicious text, emails, attachments, and other files to ask for its opinion. It’s really very good at recognizing scams. </p><hr class="wp-block-separator has-alpha-channel-opacity is-style-wide"/><h3 id="section-something-feel-off-check-it-before-you-click"><strong>Something feel off? Check it before you click. </strong> </h3><p><strong>Malwarebytes Scam Guard</strong> helps you analyze suspicious links, texts, and screenshots instantly.  </p><p>Available with Malwarebytes Premium Security for all your devices, and in the Malwarebytes app for iOS and Android.  </p><p>Try it free → </p></p></div><p><a href="https://bunny.net?ref=4buc1qv1m5" border="0"><img data-lazyloaded="1" src="data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI5MzYiIGhlaWdodD0iMTIwIiB2aWV3Qm94PSIwIDAgOTM2IDEyMCI+PHJlY3Qgd2lkdGg9IjEwMCUiIGhlaWdodD0iMTAwJSIgc3R5bGU9ImZpbGw6I2NmZDRkYjtmaWxsLW9wYWNpdHk6IDAuMTsiLz48L3N2Zz4=" decoding="async" data-src="https://image.cybernoz.com/aff/bunny.png" width="936" height="120" /></a><br /> <br /><a href="https://www.malwarebytes.com/blog/news/2026/04/more-paypal-emails-hijacked-to-deliver-tech-support-scams">Source link </a></p></div><div class="cn-share" aria-label="Share this article"> <span class="cn-share__label">Share</span><a class="cn-share__btn cn-share__btn--x" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Fcybernoz.com%2Fmore-paypal-emails-hijacked-to-deliver-tech-support-scams%2F&text=More+PayPal+emails+hijacked+to+deliver+tech+support+scams" target="_blank" rel="noopener noreferrer" aria-label="Share on X/Twitter"> <svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" viewBox="0 0 16 16"><path d="M12.6.75h2.454l-5.36 6.142L16 15.25h-4.937l-3.867-5.07-4.425 5.07H.316l5.733-6.57L0 .75h5.063l3.495 4.633L12.601.75Zm-.86 13.028h1.36L4.323 2.145H2.865l8.875 11.633Z"/></svg> <span>X / Twitter</span> </a><a class="cn-share__btn cn-share__btn--linkedin" href="https://www.linkedin.com/sharing/share-offsite/?url=https%3A%2F%2Fcybernoz.com%2Fmore-paypal-emails-hijacked-to-deliver-tech-support-scams%2F" target="_blank" rel="noopener noreferrer" aria-label="Share on LinkedIn"> <svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" viewBox="0 0 16 16"><path d="M0 1.146C0 .513.526 0 1.175 0h13.65C15.474 0 16 .513 16 1.146v13.708c0 .633-.526 1.146-1.175 1.146H1.175C.526 16 0 15.487 0 14.854V1.146zm4.943 12.248V6.169H2.542v7.225h2.401zm-1.2-8.212c.837 0 1.358-.554 1.358-1.248-.015-.709-.52-1.248-1.342-1.248-.822 0-1.359.54-1.359 1.248 0 .694.521 1.248 1.327 1.248h.016zm4.908 8.212V9.359c0-.216.016-.432.08-.586.173-.431.568-.878 1.232-.878.869 0 1.216.662 1.216 1.634v3.865h2.401V9.25c0-2.22-1.184-3.252-2.764-3.252-1.274 0-1.845.7-2.165 1.193v.025h-.016a5.54 5.54 0 0 1 .016-.025V6.169h-2.4c.03.678 0 7.225 0 7.225h2.4z"/></svg> <span>LinkedIn</span> </a><a class="cn-share__btn cn-share__btn--reddit" href="https://www.reddit.com/submit?url=https%3A%2F%2Fcybernoz.com%2Fmore-paypal-emails-hijacked-to-deliver-tech-support-scams%2F&title=More+PayPal+emails+hijacked+to+deliver+tech+support+scams" target="_blank" rel="noopener noreferrer" aria-label="Share on Reddit"> <svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" viewBox="0 0 16 16"><path d="M6.167 8a.831.831 0 0 0-.83.83c0 .459.372.84.83.831a.831.831 0 0 0 0-1.661zm1.843 3.647c.315 0 1.403-.038 1.976-.611a.232.232 0 0 0 0-.306.213.213 0 0 0-.306 0c-.353.363-1.126.487-1.67.487-.545 0-1.308-.124-1.671-.487a.213.213 0 0 0-.306 0 .213.213 0 0 0 0 .306c.564.563 1.652.61 1.977.61zm.992-2.807c0 .458.373.83.831.83.458 0 .83-.381.83-.83a.831.831 0 0 0-1.66 0z"/><path d="M16 8A8 8 0 1 1 0 8a8 8 0 0 1 16 0zm-3.828-1.165c-.315 0-.602.124-.812.325-1.781-.458-2.916-.458-2.916-.458l.612-2.169 1.525.372a.678.678 0 1 0 .07-.306l-1.68-.411a.198.198 0 0 0-.229.124l-.687 2.417s-1.148 0-2.954.458a1.16 1.16 0 0 0-.812-.325 1.165 1.165 0 0 0-.487 2.222 2.627 2.627 0 0 0-.03.391c0 1.97 2.293 3.572 5.122 3.572 2.828 0 5.122-1.603 5.122-3.572 0-.134-.01-.268-.039-.4a1.158 1.158 0 0 0-.487-2.222h-.018z"/></svg> <span>Reddit</span> </a><a class="cn-share__btn cn-share__btn--whatsapp" href="https://wa.me/?text=More+PayPal+emails+hijacked+to+deliver+tech+support+scams%20https%3A%2F%2Fcybernoz.com%2Fmore-paypal-emails-hijacked-to-deliver-tech-support-scams%2F" target="_blank" rel="noopener noreferrer" aria-label="Share on WhatsApp"> <svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" viewBox="0 0 16 16"><path d="M13.601 2.326A7.854 7.854 0 0 0 7.994 0C3.627 0 .068 3.558.064 7.926c0 1.399.366 2.76 1.057 3.965L0 16l4.204-1.102a7.933 7.933 0 0 0 3.79.965h.004c4.368 0 7.926-3.558 7.93-7.93A7.898 7.898 0 0 0 13.6 2.326zM7.994 14.521a6.573 6.573 0 0 1-3.356-.92l-.24-.144-2.494.654.666-2.433-.156-.251a6.56 6.56 0 0 1-1.007-3.505c0-3.626 2.957-6.584 6.591-6.584a6.56 6.56 0 0 1 4.66 1.931 6.557 6.557 0 0 1 1.928 4.66c-.004 3.639-2.961 6.592-6.592 6.592zm3.615-4.934c-.197-.099-1.17-.578-1.353-.646-.182-.065-.315-.099-.445.099-.133.197-.513.646-.627.775-.114.133-.232.148-.43.05-.197-.1-.836-.308-1.592-.985-.59-.525-.985-1.175-1.103-1.372-.114-.198-.011-.304.088-.403.087-.088.197-.232.296-.346.1-.114.133-.198.198-.33.065-.134.034-.248-.015-.347-.05-.099-.445-1.076-.612-1.47-.16-.389-.323-.335-.445-.34-.114-.007-.247-.007-.38-.007a.729.729 0 0 0-.529.247c-.182.198-.691.677-.691 1.654 0 .977.71 1.916.81 2.049.098.133 1.394 2.132 3.383 2.992.47.205.84.326 1.129.418.475.152.904.129 1.246.08.38-.058 1.171-.48 1.338-.943.164-.464.164-.86.114-.943-.049-.084-.182-.133-.38-.232z"/></svg> <span>WhatsApp</span> </a><a class="cn-share__btn cn-share__btn--email" href="mailto:?subject=More+PayPal+emails+hijacked+to+deliver+tech+support+scams&body=https%3A%2F%2Fcybernoz.com%2Fmore-paypal-emails-hijacked-to-deliver-tech-support-scams%2F" aria-label="Share via Email"> <svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" viewBox="0 0 16 16"><path d="M0 4a2 2 0 0 1 2-2h12a2 2 0 0 1 2 2v8a2 2 0 0 1-2 2H2a2 2 0 0 1-2-2V4Zm2-1a1 1 0 0 0-1 1v.217l7 4.2 7-4.2V4a1 1 0 0 0-1-1H2Zm13 2.383-4.708 2.825L15 11.105V5.383Zm-.034 6.876-5.64-3.471L8 9.583l-1.326-.795-5.64 3.47A1 1 0 0 0 2 13h12a1 1 0 0 0 .966-.741ZM1 11.105l4.708-2.897L1 5.383v5.722Z"/></svg> <span>Email</span> </a><button class="cn-share__btn cn-share__btn--copy" onclick="navigator.clipboard.writeText('https://cybernoz.com/more-paypal-emails-hijacked-to-deliver-tech-support-scams/').then(()=>{this.querySelector('span').textContent='Copied!';setTimeout(()=>{this.querySelector('span').textContent='Copy Link'},2000)})" aria-label="Copy link"> <svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" viewBox="0 0 16 16"><path d="M4.715 6.542 3.343 7.914a3 3 0 1 0 4.243 4.243l1.828-1.829A3 3 0 0 0 8.586 5.5L8 6.086a1.002 1.002 0 0 0-.154.199 2 2 0 0 1 .861 3.337L6.88 11.45a2 2 0 1 1-2.83-2.83l.793-.792a4.018 4.018 0 0 1-.128-1.287z"/><path d="M6.586 4.672A3 3 0 0 0 7.414 9.5l.775-.776a2 2 0 0 1-.896-3.346L9.12 3.55a2 2 0 1 1 2.83 2.83l-.793.792c.112.42.155.855.128 1.287l1.372-1.372a3 3 0 1 0-4.243-4.243L6.586 4.672z"/></svg> <span>Copy Link</span> </button></div><nav class="cn-post-nav" aria-label="Post navigation" style="display:flex;justify-content:space-between;gap:1rem;margin-top:2rem;padding-top:1.5rem;border-top:1px solid var(--cn-border);"><div style="flex:1;"> <span style="font-size:0.8rem;color:var(--cn-text-muted);">« Previous</span><br><a href="https://cybernoz.com/pytorch-lightning-and-intercom-client-hit-in-supply-chain-attacks-to-steal-credentials/" rel="prev">PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials</a></div><div style="flex:1;text-align:right;"> <span style="font-size:0.8rem;color:var(--cn-text-muted);">Next »</span><br><a href="https://cybernoz.com/cisco-releases-open-source-toolkit-for-verifying-ai-model-lineage/" rel="next">Cisco releases open-source toolkit for verifying AI model lineage</a></div></nav></article><section class="cn-related" aria-label="Related articles"><div class="cn-section-header"><h2>Related Articles</h2> <a href="https://cybernoz.com/category/malwarebytes/" class="cn-section-header__link"> All MalwareBytes → </a></div><div class="cn-posts-grid"><article class="cn-card post-34766 post type-post status-publish format-standard has-post-thumbnail hentry category-malwarebytes" itemscope itemtype="https://schema.org/NewsArticle"><div class="cn-card__image"> <a href="https://cybernoz.com/facebook-clickbait-leads-to-money-scam-for-users/" aria-hidden="true" tabindex="-1"> <img width="360" height="270" src="https://image.cybernoz.com/wp-content/uploads/2023/06/Facebook-clickbait-leads-to-money-scam-for-users.png" class="attachment-cybernoz-card size-cybernoz-card wp-post-image" alt="Facebook clickbait leads to money scam for users" itemprop="image" decoding="async" /> </a> <a class="cn-card__category" href="https://cybernoz.com/category/malwarebytes/">MalwareBytes</a></div><div class="cn-card__body"><h3 class="cn-card__title" itemprop="headline"> <a href="https://cybernoz.com/facebook-clickbait-leads-to-money-scam-for-users/" itemprop="url">Facebook clickbait leads to money scam for users</a></h3><p class="cn-card__excerpt" itemprop="description">Table of Contents Facebook posts with malicious links Decoy/cloaking Google Cloud Run "infrastructure" Staying protected with social media and scams Indicators of Compromise Clickbait posts on…</p><div class="cn-card__meta"> <time datetime="2023-06-08T00:11:38+03:00"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M4 .5a.5.5 0 0 0-1 0V1H2a2 2 0 0 0-2 2v1h16V3a2 2 0 0 0-2-2h-1V.5a.5.5 0 0 0-1 0V1H4V.5zM16 14V5H0v9a2 2 0 0 0 2 2h12a2 2 0 0 0 2-2z"/></svg> June 8, 2023 </time> <span class="cn-card__author"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M8 8a3 3 0 1 0 0-6 3 3 0 0 0 0 6zm2-3a2 2 0 1 1-4 0 2 2 0 0 1 4 0zm4 8c0 1-1 1-1 1H3s-1 0-1-1 1-4 6-4 6 3 6 4zm-1-.004c-.001-.246-.154-.986-.832-1.664C11.516 10.68 10.289 10 8 10c-2.29 0-3.516.68-4.168 1.332-.678.678-.83 1.418-.832 1.664h10z"/></svg> <a href="https://cybernoz.com/author/cybernoz/" rel="author">Cybernoz</a> </span> <span class="cn-card__reading-time"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M8 3.5a.5.5 0 0 0-1 0V8a.5.5 0 0 0 .252.434l3.5 2a.5.5 0 0 0 .496-.868L8 7.71V3.5z"/><path d="M8 16A8 8 0 1 0 8 0a8 8 0 0 0 0 16zm7-8A7 7 0 1 1 1 8a7 7 0 0 1 14 0z"/></svg> 4 min read </span></div><meta itemprop="datePublished" content="2023-06-08T00:11:38+03:00"><meta itemprop="author" content="Cybernoz"></div></article><article class="cn-card post-77174 post type-post status-publish format-standard has-post-thumbnail hentry category-malwarebytes" itemscope itemtype="https://schema.org/NewsArticle"><div class="cn-card__image"> <a href="https://cybernoz.com/malicious-meeting-invite-fix-targets-mac-users/" aria-hidden="true" tabindex="-1"> <img width="360" height="270" src="https://image.cybernoz.com/wp-content/uploads/2024/03/Malicious-meeting-invite-fix-targets-Mac-users.png" class="attachment-cybernoz-card size-cybernoz-card wp-post-image" alt="Malicious meeting invite fix targets Mac users" itemprop="image" decoding="async" loading="lazy" /> </a> <a class="cn-card__category" href="https://cybernoz.com/category/malwarebytes/">MalwareBytes</a></div><div class="cn-card__body"><h3 class="cn-card__title" itemprop="headline"> <a href="https://cybernoz.com/malicious-meeting-invite-fix-targets-mac-users/" itemprop="url">Malicious meeting invite fix targets Mac users</a></h3><p class="cn-card__excerpt" itemprop="description">Cybercriminals are targeting Mac users interested in cryptocurrency opportunities with fake calendar invites. During the attacks the criminals will send a link supposedly to add…</p><div class="cn-card__meta"> <time datetime="2024-03-01T21:37:42+03:00"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M4 .5a.5.5 0 0 0-1 0V1H2a2 2 0 0 0-2 2v1h16V3a2 2 0 0 0-2-2h-1V.5a.5.5 0 0 0-1 0V1H4V.5zM16 14V5H0v9a2 2 0 0 0 2 2h12a2 2 0 0 0 2-2z"/></svg> March 1, 2024 </time> <span class="cn-card__author"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M8 8a3 3 0 1 0 0-6 3 3 0 0 0 0 6zm2-3a2 2 0 1 1-4 0 2 2 0 0 1 4 0zm4 8c0 1-1 1-1 1H3s-1 0-1-1 1-4 6-4 6 3 6 4zm-1-.004c-.001-.246-.154-.986-.832-1.664C11.516 10.68 10.289 10 8 10c-2.29 0-3.516.68-4.168 1.332-.678.678-.83 1.418-.832 1.664h10z"/></svg> <a href="https://cybernoz.com/author/cybernoz/" rel="author">Cybernoz</a> </span> <span class="cn-card__reading-time"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M8 3.5a.5.5 0 0 0-1 0V8a.5.5 0 0 0 .252.434l3.5 2a.5.5 0 0 0 .496-.868L8 7.71V3.5z"/><path d="M8 16A8 8 0 1 0 8 0a8 8 0 0 0 0 16zm7-8A7 7 0 1 1 1 8a7 7 0 0 1 14 0z"/></svg> 4 min read </span></div><meta itemprop="datePublished" content="2024-03-01T21:37:42+03:00"><meta itemprop="author" content="Cybernoz"></div></article><article class="cn-card post-236308 post type-post status-publish format-standard has-post-thumbnail hentry category-malwarebytes" itemscope itemtype="https://schema.org/NewsArticle"><div class="cn-card__image"> <a href="https://cybernoz.com/deepfake-sextortion-forces-schools-to-remove-student-photos-from-websites/" aria-hidden="true" tabindex="-1"> <img width="600" height="340" src="https://image.cybernoz.com/wp-content/uploads/2026/05/Deepfake-sextortion-forces-schools-to-remove-student-photos-from-websites-600x340.jpg" class="attachment-cybernoz-card size-cybernoz-card wp-post-image" alt="Deepfake sextortion forces schools to remove student photos from websites" itemprop="image" decoding="async" loading="lazy" /> </a> <a class="cn-card__category" href="https://cybernoz.com/category/malwarebytes/">MalwareBytes</a></div><div class="cn-card__body"><h3 class="cn-card__title" itemprop="headline"> <a href="https://cybernoz.com/deepfake-sextortion-forces-schools-to-remove-student-photos-from-websites/" itemprop="url">Deepfake sextortion forces schools to remove student photos from websites</a></h3><p class="cn-card__excerpt" itemprop="description">Table of Contents One school, 150 images How we got here What the schools are being told What happens next Someone’s watching your accounts. Make sure…</p><div class="cn-card__meta"> <time datetime="2026-05-14T21:00:04+03:00"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M4 .5a.5.5 0 0 0-1 0V1H2a2 2 0 0 0-2 2v1h16V3a2 2 0 0 0-2-2h-1V.5a.5.5 0 0 0-1 0V1H4V.5zM16 14V5H0v9a2 2 0 0 0 2 2h12a2 2 0 0 0 2-2z"/></svg> May 14, 2026 </time> <span class="cn-card__author"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M8 8a3 3 0 1 0 0-6 3 3 0 0 0 0 6zm2-3a2 2 0 1 1-4 0 2 2 0 0 1 4 0zm4 8c0 1-1 1-1 1H3s-1 0-1-1 1-4 6-4 6 3 6 4zm-1-.004c-.001-.246-.154-.986-.832-1.664C11.516 10.68 10.289 10 8 10c-2.29 0-3.516.68-4.168 1.332-.678.678-.83 1.418-.832 1.664h10z"/></svg> <a href="https://cybernoz.com/author/cybernoz/" rel="author">Cybernoz</a> </span> <span class="cn-card__reading-time"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M8 3.5a.5.5 0 0 0-1 0V8a.5.5 0 0 0 .252.434l3.5 2a.5.5 0 0 0 .496-.868L8 7.71V3.5z"/><path d="M8 16A8 8 0 1 0 8 0a8 8 0 0 0 0 16zm7-8A7 7 0 1 1 1 8a7 7 0 0 1 14 0z"/></svg> 4 min read </span></div><meta itemprop="datePublished" content="2026-05-14T21:00:04+03:00"><meta itemprop="author" content="Cybernoz"></div></article><article class="cn-card post-155836 post type-post status-publish format-standard has-post-thumbnail hentry category-malwarebytes" itemscope itemtype="https://schema.org/NewsArticle"><div class="cn-card__image"> <a href="https://cybernoz.com/child-predators-are-lurking-on-dating-apps-warns-report/" aria-hidden="true" tabindex="-1"> <img width="600" height="338" src="https://image.cybernoz.com/wp-content/uploads/2025/04/Child-predators-are-lurking-on-dating-apps-warns-report.png" class="attachment-cybernoz-card size-cybernoz-card wp-post-image" alt="Image of man in the shadows" itemprop="image" decoding="async" loading="lazy" srcset="https://image.cybernoz.com/wp-content/uploads/2025/04/Child-predators-are-lurking-on-dating-apps-warns-report.png 1200w, https://image.cybernoz.com/wp-content/uploads/2025/04/Child-predators-are-lurking-on-dating-apps-warns-report-768x432.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /> </a> <a class="cn-card__category" href="https://cybernoz.com/category/malwarebytes/">MalwareBytes</a></div><div class="cn-card__body"><h3 class="cn-card__title" itemprop="headline"> <a href="https://cybernoz.com/child-predators-are-lurking-on-dating-apps-warns-report/" itemprop="url">Child predators are lurking on dating apps, warns report</a></h3><p class="cn-card__excerpt" itemprop="description">Using a dating app? Beware of your potential partner’s motives. A report from Edinburgh University warns that child abusers are using these apps to find…</p><div class="cn-card__meta"> <time datetime="2025-04-10T17:22:06+03:00"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M4 .5a.5.5 0 0 0-1 0V1H2a2 2 0 0 0-2 2v1h16V3a2 2 0 0 0-2-2h-1V.5a.5.5 0 0 0-1 0V1H4V.5zM16 14V5H0v9a2 2 0 0 0 2 2h12a2 2 0 0 0 2-2z"/></svg> April 10, 2025 </time> <span class="cn-card__author"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M8 8a3 3 0 1 0 0-6 3 3 0 0 0 0 6zm2-3a2 2 0 1 1-4 0 2 2 0 0 1 4 0zm4 8c0 1-1 1-1 1H3s-1 0-1-1 1-4 6-4 6 3 6 4zm-1-.004c-.001-.246-.154-.986-.832-1.664C11.516 10.68 10.289 10 8 10c-2.29 0-3.516.68-4.168 1.332-.678.678-.83 1.418-.832 1.664h10z"/></svg> <a href="https://cybernoz.com/author/cybernoz/" rel="author">Cybernoz</a> </span> <span class="cn-card__reading-time"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M8 3.5a.5.5 0 0 0-1 0V8a.5.5 0 0 0 .252.434l3.5 2a.5.5 0 0 0 .496-.868L8 7.71V3.5z"/><path d="M8 16A8 8 0 1 0 8 0a8 8 0 0 0 0 16zm7-8A7 7 0 1 1 1 8a7 7 0 0 1 14 0z"/></svg> 3 min read </span></div><meta itemprop="datePublished" content="2025-04-10T17:22:06+03:00"><meta itemprop="author" content="Cybernoz"></div></article><article class="cn-card post-170566 post type-post status-publish format-standard has-post-thumbnail hentry category-malwarebytes" itemscope itemtype="https://schema.org/NewsArticle"><div class="cn-card__image"> <a href="https://cybernoz.com/scammers-are-constantly-changing-the-game-but-so-are-we-introducing-malwarebytes-scam-guard/" aria-hidden="true" tabindex="-1"> <img width="600" height="314" src="https://image.cybernoz.com/wp-content/uploads/2025/06/Scammers-are-constantly-changing-the-game-but-so-are-we.png" class="attachment-cybernoz-card size-cybernoz-card wp-post-image" alt="Scammers are constantly changing the game, but so are we. Introducing Malwarebytes Scam Guard" itemprop="image" decoding="async" loading="lazy" srcset="https://image.cybernoz.com/wp-content/uploads/2025/06/Scammers-are-constantly-changing-the-game-but-so-are-we.png 1200w, https://image.cybernoz.com/wp-content/uploads/2025/06/Scammers-are-constantly-changing-the-game-but-so-are-we-768x401.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /> </a> <a class="cn-card__category" href="https://cybernoz.com/category/malwarebytes/">MalwareBytes</a></div><div class="cn-card__body"><h3 class="cn-card__title" itemprop="headline"> <a href="https://cybernoz.com/scammers-are-constantly-changing-the-game-but-so-are-we-introducing-malwarebytes-scam-guard/" itemprop="url">Scammers are constantly changing the game, but so are we. Introducing Malwarebytes Scam Guard</a></h3><p class="cn-card__excerpt" itemprop="description">Mobile scams are becoming increasingly sophisticated, leaving people vulnerable to cybercriminals.   We recently reported on the ever-increasing number of scams that are created by…</p><div class="cn-card__meta"> <time datetime="2025-06-03T19:49:00+03:00"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M4 .5a.5.5 0 0 0-1 0V1H2a2 2 0 0 0-2 2v1h16V3a2 2 0 0 0-2-2h-1V.5a.5.5 0 0 0-1 0V1H4V.5zM16 14V5H0v9a2 2 0 0 0 2 2h12a2 2 0 0 0 2-2z"/></svg> June 3, 2025 </time> <span class="cn-card__author"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M8 8a3 3 0 1 0 0-6 3 3 0 0 0 0 6zm2-3a2 2 0 1 1-4 0 2 2 0 0 1 4 0zm4 8c0 1-1 1-1 1H3s-1 0-1-1 1-4 6-4 6 3 6 4zm-1-.004c-.001-.246-.154-.986-.832-1.664C11.516 10.68 10.289 10 8 10c-2.29 0-3.516.68-4.168 1.332-.678.678-.83 1.418-.832 1.664h10z"/></svg> <a href="https://cybernoz.com/author/cybernoz/" rel="author">Cybernoz</a> </span> <span class="cn-card__reading-time"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M8 3.5a.5.5 0 0 0-1 0V8a.5.5 0 0 0 .252.434l3.5 2a.5.5 0 0 0 .496-.868L8 7.71V3.5z"/><path d="M8 16A8 8 0 1 0 8 0a8 8 0 0 0 0 16zm7-8A7 7 0 1 1 1 8a7 7 0 0 1 14 0z"/></svg> 2 min read </span></div><meta itemprop="datePublished" content="2025-06-03T19:49:00+03:00"><meta itemprop="author" content="Cybernoz"></div></article><article class="cn-card post-33190 post type-post status-publish format-standard has-post-thumbnail hentry category-malwarebytes" itemscope itemtype="https://schema.org/NewsArticle"><div class="cn-card__image"> <a href="https://cybernoz.com/zyxel-patches-two-critical-vulnerabilities/" aria-hidden="true" tabindex="-1"> <img width="360" height="270" src="https://image.cybernoz.com/wp-content/uploads/2023/05/Zyxel-patches-two-critical-vulnerabilities.png" class="attachment-cybernoz-card size-cybernoz-card wp-post-image" alt="Zyxel patches two critical vulnerabilities" itemprop="image" decoding="async" loading="lazy" /> </a> <a class="cn-card__category" href="https://cybernoz.com/category/malwarebytes/">MalwareBytes</a></div><div class="cn-card__body"><h3 class="cn-card__title" itemprop="headline"> <a href="https://cybernoz.com/zyxel-patches-two-critical-vulnerabilities/" itemprop="url">Zyxel patches two critical vulnerabilities</a></h3><p class="cn-card__excerpt" itemprop="description">Zyxel has released a security advisory about two critical vulnerabilities that could allow an unauthorized, remote attacker to take control of its firewall devices. Zyxell…</p><div class="cn-card__meta"> <time datetime="2023-05-27T00:14:40+03:00"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M4 .5a.5.5 0 0 0-1 0V1H2a2 2 0 0 0-2 2v1h16V3a2 2 0 0 0-2-2h-1V.5a.5.5 0 0 0-1 0V1H4V.5zM16 14V5H0v9a2 2 0 0 0 2 2h12a2 2 0 0 0 2-2z"/></svg> May 27, 2023 </time> <span class="cn-card__author"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M8 8a3 3 0 1 0 0-6 3 3 0 0 0 0 6zm2-3a2 2 0 1 1-4 0 2 2 0 0 1 4 0zm4 8c0 1-1 1-1 1H3s-1 0-1-1 1-4 6-4 6 3 6 4zm-1-.004c-.001-.246-.154-.986-.832-1.664C11.516 10.68 10.289 10 8 10c-2.29 0-3.516.68-4.168 1.332-.678.678-.83 1.418-.832 1.664h10z"/></svg> <a href="https://cybernoz.com/author/cybernoz/" rel="author">Cybernoz</a> </span> <span class="cn-card__reading-time"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" fill="currentColor"><path d="M8 3.5a.5.5 0 0 0-1 0V8a.5.5 0 0 0 .252.434l3.5 2a.5.5 0 0 0 .496-.868L8 7.71V3.5z"/><path d="M8 16A8 8 0 1 0 8 0a8 8 0 0 0 0 16zm7-8A7 7 0 1 1 1 8a7 7 0 0 1 14 0z"/></svg> 3 min read </span></div><meta itemprop="datePublished" content="2023-05-27T00:14:40+03:00"><meta itemprop="author" content="Cybernoz"></div></article></div></section><div id="comments" class="cn-comments"></div></div><aside class="cn-sidebar" role="complementary" aria-label="Sidebar"><div id="block-3" class="cn-widget widget_block"><div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow"><h2 class="wp-block-heading">Latest Posts</h2><ul class="wp-block-latest-posts__list wp-block-latest-posts"><li><a class="wp-block-latest-posts__post-title" href="https://cybernoz.com/compromised-coding-tool-helped-hackers-breach-thousands-of-github-repositories/">Compromised coding tool helped hackers breach thousands of GitHub repositories</a></li><li><a class="wp-block-latest-posts__post-title" href="https://cybernoz.com/meet-rampart-and-clarity-microsofts-new-red-team-combo-ai-agents/">Meet Rampart and Clarity, Microsoft’s new red team combo AI agents</a></li><li><a class="wp-block-latest-posts__post-title" href="https://cybernoz.com/asd-warns-of-device-code-phishing-as-proofpoint-tracks-growing-criminal-toolkits/">ASD warns of device code phishing as Proofpoint tracks growing criminal toolkits</a></li><li><a class="wp-block-latest-posts__post-title" href="https://cybernoz.com/antv-data-visualization-tool-the-latest-to-be-hit-by-ongoing-npm-supply-chain-attacks/">AntV data visualization tool the latest to be hit by ongoing npm supply chain attacks</a></li><li><a class="wp-block-latest-posts__post-title" href="https://cybernoz.com/google-publishes-exploit-code-threatening-millions-of-chromium-users/">Google publishes exploit code threatening millions of Chromium users</a></li></ul></div></div></div><div id="block-12" class="cn-widget widget_block widget_categories"><ul class="wp-block-categories-list wp-block-categories"><li class="cat-item cat-item-9971"><a href="https://cybernoz.com/category/agbi/">Agbi</a></li><li class="cat-item cat-item-9986"><a href="https://cybernoz.com/category/arstechnica/">ArsTechnica</a></li><li class="cat-item cat-item-9981"><a href="https://cybernoz.com/category/attackdefense/">AttackDefense</a></li><li class="cat-item cat-item-9974"><a href="https://cybernoz.com/category/australiancybersecuritymagazine/">Australiancybersecuritymagazine</a></li><li class="cat-item cat-item-9892"><a href="https://cybernoz.com/category/bankinfosecurity/">Bankinfosecurity</a></li><li class="cat-item cat-item-2"><a href="https://cybernoz.com/category/bleeping-computer/">Bleeping Computer</a></li><li class="cat-item cat-item-9984"><a href="https://cybernoz.com/category/cisoonline/">CISOOnline</a></li><li class="cat-item cat-item-9991"><a href="https://cybernoz.com/category/cloudsecurity/">CloudSecurity</a></li><li class="cat-item cat-item-9891"><a href="https://cybernoz.com/category/computerweekly/">ComputerWeekly</a></li><li class="cat-item cat-item-9983"><a href="https://cybernoz.com/category/crowdstrike/">Crowdstrike</a></li><li class="cat-item cat-item-5821"><a href="https://cybernoz.com/category/cybersecurityventures/">Cyber Security Ventures</a></li><li class="cat-item cat-item-85"><a href="https://cybernoz.com/category/cyberdefensemagazine/">CyberDefenseMagazine</a></li><li class="cat-item cat-item-714"><a href="https://cybernoz.com/category/cybernews/">CyberNews</a></li><li class="cat-item cat-item-9957"><a href="https://cybernoz.com/category/cyberscoop/">Cyberscoop</a></li><li class="cat-item cat-item-4393"><a href="https://cybernoz.com/category/cybersecurity-insiders/">CyberSecurity-Insiders</a></li><li class="cat-item cat-item-9955"><a href="https://cybernoz.com/category/cybersecuritydive/">CyberSecurityDive</a></li><li class="cat-item cat-item-4"><a href="https://cybernoz.com/category/cybersecuritynews/">CyberSecurityNews</a></li><li class="cat-item cat-item-9975"><a href="https://cybernoz.com/category/cyberwire/">CyberWire</a></li><li class="cat-item cat-item-9890"><a href="https://cybernoz.com/category/darkreading/">DarkReading</a></li><li class="cat-item cat-item-863"><a href="https://cybernoz.com/category/exploitone/">ExploitOne</a></li><li class="cat-item cat-item-871"><a href="https://cybernoz.com/category/gbhackers/">GBHackers</a></li><li class="cat-item cat-item-1"><a href="https://cybernoz.com/category/genel/">Genel</a></li><li class="cat-item cat-item-4384"><a href="https://cybernoz.com/category/hackercombat/">HackerCombat</a></li><li class="cat-item cat-item-4380"><a href="https://cybernoz.com/category/hackread/">HackRead</a></li><li class="cat-item cat-item-8604"><a href="https://cybernoz.com/category/helpnetsecurity/">HelpnetSecurity</a></li><li class="cat-item cat-item-9989"><a href="https://cybernoz.com/category/industrialcyber/">IndustrialCyber</a></li><li class="cat-item cat-item-9987"><a href="https://cybernoz.com/category/infosecurity/">InfoSecurity</a></li><li class="cat-item cat-item-9888"><a href="https://cybernoz.com/category/itnews/">ITnews</a></li><li class="cat-item cat-item-109"><a href="https://cybernoz.com/category/itsecurityguru/">ITSecurityGuru</a></li><li class="cat-item cat-item-126"><a href="https://cybernoz.com/category/krebson/">Krebson</a></li><li class="cat-item cat-item-8607"><a href="https://cybernoz.com/category/malwarebytes/">MalwareBytes</a></li><li class="cat-item cat-item-9893"><a href="https://cybernoz.com/category/mix/">Mix</a></li><li class="cat-item cat-item-9990"><a href="https://cybernoz.com/category/otsecurity/">OTSecurity</a></li><li class="cat-item cat-item-5"><a href="https://cybernoz.com/category/portswigger/">PortSwigger</a></li><li class="cat-item cat-item-9982"><a href="https://cybernoz.com/category/rapid7/">Rapid7</a></li><li class="cat-item cat-item-9973"><a href="https://cybernoz.com/category/scmp/">SCMP</a></li><li class="cat-item cat-item-9980"><a href="https://cybernoz.com/category/securelirt/">securelist</a></li><li class="cat-item cat-item-9895"><a href="https://cybernoz.com/category/securityaffairs/">Securityaffairs</a></li><li class="cat-item cat-item-9894"><a href="https://cybernoz.com/category/securityweek/">SecurityWeek</a></li><li class="cat-item cat-item-9985"><a href="https://cybernoz.com/category/techcrunch/">techcrunch</a></li><li class="cat-item cat-item-9889"><a href="https://cybernoz.com/category/thecyberexpress/">TheCyberExpress</a></li><li class="cat-item cat-item-3"><a href="https://cybernoz.com/category/thehackernews/">TheHackerNews</a></li><li class="cat-item cat-item-9993"><a href="https://cybernoz.com/category/threatintelligence-incidentresponse/">ThreatIntelligence-IncidentResponse</a></li><li class="cat-item cat-item-9978"><a href="https://cybernoz.com/category/tldrsec/">Tldrsec</a></li><li class="cat-item cat-item-9979"><a href="https://cybernoz.com/category/unit42/">Unit42</a></li><li class="cat-item cat-item-9992"><a href="https://cybernoz.com/category/vendorresearch/">VendorResearch</a></li><li class="cat-item cat-item-9967"><a href="https://cybernoz.com/category/welivesecurity/">welivesecurity</a></li><li class="cat-item cat-item-707"><a href="https://cybernoz.com/category/wired/">Wired</a></li><li class="cat-item cat-item-9977"><a href="https://cybernoz.com/category/zerosalarium/">Zerosalarium</a></li></ul></div></aside></div></div></main><footer class="cn-footer" role="contentinfo" itemscope itemtype="https://schema.org/WPFooter"><div class="cn-container"><div class="cn-footer__main"><div class="cn-footer__brand"> <a href="https://cybernoz.com/" class="cn-logo" style="color:#fff;"> <span class="cn-logo__icon" aria-hidden="true">☍</span> CyberNoz </a><p>Cybersecurity News</p></div><div><div id="block-15" class="cn-footer-widget widget_block widget_categories"><ul class="wp-block-categories-list wp-block-categories"><li class="cat-item cat-item-9971"><a href="https://cybernoz.com/category/agbi/">Agbi</a></li><li class="cat-item cat-item-9986"><a href="https://cybernoz.com/category/arstechnica/">ArsTechnica</a></li><li class="cat-item cat-item-9981"><a href="https://cybernoz.com/category/attackdefense/">AttackDefense</a></li><li class="cat-item cat-item-9974"><a href="https://cybernoz.com/category/australiancybersecuritymagazine/">Australiancybersecuritymagazine</a></li><li class="cat-item cat-item-9892"><a href="https://cybernoz.com/category/bankinfosecurity/">Bankinfosecurity</a></li><li class="cat-item cat-item-2"><a href="https://cybernoz.com/category/bleeping-computer/">Bleeping Computer</a></li><li class="cat-item cat-item-9984"><a href="https://cybernoz.com/category/cisoonline/">CISOOnline</a></li><li class="cat-item cat-item-9991"><a href="https://cybernoz.com/category/cloudsecurity/">CloudSecurity</a></li><li class="cat-item cat-item-9891"><a href="https://cybernoz.com/category/computerweekly/">ComputerWeekly</a></li><li class="cat-item cat-item-9983"><a href="https://cybernoz.com/category/crowdstrike/">Crowdstrike</a></li><li class="cat-item cat-item-5821"><a href="https://cybernoz.com/category/cybersecurityventures/">Cyber Security Ventures</a></li><li class="cat-item cat-item-85"><a href="https://cybernoz.com/category/cyberdefensemagazine/">CyberDefenseMagazine</a></li><li class="cat-item cat-item-714"><a href="https://cybernoz.com/category/cybernews/">CyberNews</a></li><li class="cat-item cat-item-9957"><a href="https://cybernoz.com/category/cyberscoop/">Cyberscoop</a></li><li class="cat-item cat-item-4393"><a href="https://cybernoz.com/category/cybersecurity-insiders/">CyberSecurity-Insiders</a></li><li class="cat-item cat-item-9955"><a href="https://cybernoz.com/category/cybersecuritydive/">CyberSecurityDive</a></li><li class="cat-item cat-item-4"><a href="https://cybernoz.com/category/cybersecuritynews/">CyberSecurityNews</a></li><li class="cat-item cat-item-9975"><a href="https://cybernoz.com/category/cyberwire/">CyberWire</a></li><li class="cat-item cat-item-9890"><a href="https://cybernoz.com/category/darkreading/">DarkReading</a></li><li class="cat-item cat-item-863"><a href="https://cybernoz.com/category/exploitone/">ExploitOne</a></li><li class="cat-item cat-item-871"><a href="https://cybernoz.com/category/gbhackers/">GBHackers</a></li><li class="cat-item cat-item-1"><a href="https://cybernoz.com/category/genel/">Genel</a></li><li class="cat-item cat-item-4384"><a href="https://cybernoz.com/category/hackercombat/">HackerCombat</a></li><li class="cat-item cat-item-4380"><a href="https://cybernoz.com/category/hackread/">HackRead</a></li><li class="cat-item cat-item-8604"><a href="https://cybernoz.com/category/helpnetsecurity/">HelpnetSecurity</a></li><li class="cat-item cat-item-9989"><a href="https://cybernoz.com/category/industrialcyber/">IndustrialCyber</a></li><li class="cat-item cat-item-9987"><a href="https://cybernoz.com/category/infosecurity/">InfoSecurity</a></li><li class="cat-item cat-item-9888"><a href="https://cybernoz.com/category/itnews/">ITnews</a></li><li class="cat-item cat-item-109"><a href="https://cybernoz.com/category/itsecurityguru/">ITSecurityGuru</a></li><li class="cat-item cat-item-126"><a href="https://cybernoz.com/category/krebson/">Krebson</a></li><li class="cat-item cat-item-8607"><a href="https://cybernoz.com/category/malwarebytes/">MalwareBytes</a></li><li class="cat-item cat-item-9893"><a href="https://cybernoz.com/category/mix/">Mix</a></li><li class="cat-item cat-item-9990"><a href="https://cybernoz.com/category/otsecurity/">OTSecurity</a></li><li class="cat-item cat-item-5"><a href="https://cybernoz.com/category/portswigger/">PortSwigger</a></li><li class="cat-item cat-item-9982"><a href="https://cybernoz.com/category/rapid7/">Rapid7</a></li><li class="cat-item cat-item-9973"><a href="https://cybernoz.com/category/scmp/">SCMP</a></li><li class="cat-item cat-item-9980"><a href="https://cybernoz.com/category/securelirt/">securelist</a></li><li class="cat-item cat-item-9895"><a href="https://cybernoz.com/category/securityaffairs/">Securityaffairs</a></li><li class="cat-item cat-item-9894"><a href="https://cybernoz.com/category/securityweek/">SecurityWeek</a></li><li class="cat-item cat-item-9985"><a href="https://cybernoz.com/category/techcrunch/">techcrunch</a></li><li class="cat-item cat-item-9889"><a href="https://cybernoz.com/category/thecyberexpress/">TheCyberExpress</a></li><li class="cat-item cat-item-3"><a href="https://cybernoz.com/category/thehackernews/">TheHackerNews</a></li><li class="cat-item cat-item-9993"><a href="https://cybernoz.com/category/threatintelligence-incidentresponse/">ThreatIntelligence-IncidentResponse</a></li><li class="cat-item cat-item-9978"><a href="https://cybernoz.com/category/tldrsec/">Tldrsec</a></li><li class="cat-item cat-item-9979"><a href="https://cybernoz.com/category/unit42/">Unit42</a></li><li class="cat-item cat-item-9992"><a href="https://cybernoz.com/category/vendorresearch/">VendorResearch</a></li><li class="cat-item cat-item-9967"><a href="https://cybernoz.com/category/welivesecurity/">welivesecurity</a></li><li class="cat-item cat-item-707"><a href="https://cybernoz.com/category/wired/">Wired</a></li><li class="cat-item cat-item-9977"><a href="https://cybernoz.com/category/zerosalarium/">Zerosalarium</a></li></ul></div></div><div><div class="cn-footer__heading">Archive</div><ul><li><a href='https://cybernoz.com/2026/05/'>May 2026</a></li><li><a href='https://cybernoz.com/2026/04/'>April 2026</a></li><li><a href='https://cybernoz.com/2026/03/'>March 2026</a></li><li><a href='https://cybernoz.com/2026/02/'>February 2026</a></li><li><a href='https://cybernoz.com/2026/01/'>January 2026</a></li><li><a href='https://cybernoz.com/2025/12/'>December 2025</a></li><li><a href='https://cybernoz.com/2025/11/'>November 2025</a></li><li><a href='https://cybernoz.com/2025/10/'>October 2025</a></li><li><a href='https://cybernoz.com/2025/09/'>September 2025</a></li><li><a href='https://cybernoz.com/2025/08/'>August 2025</a></li><li><a href='https://cybernoz.com/2025/07/'>July 2025</a></li><li><a href='https://cybernoz.com/2025/06/'>June 2025</a></li></ul></div><div><div id="block-18" class="cn-footer-widget widget_block"><div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex"><div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:100%"><ul class="wp-block-archives-list wp-block-archives"><li><a href='https://cybernoz.com/2026/05/'>May 2026</a></li><li><a href='https://cybernoz.com/2026/04/'>April 2026</a></li><li><a href='https://cybernoz.com/2026/03/'>March 2026</a></li><li><a href='https://cybernoz.com/2026/02/'>February 2026</a></li><li><a href='https://cybernoz.com/2026/01/'>January 2026</a></li><li><a href='https://cybernoz.com/2025/12/'>December 2025</a></li><li><a href='https://cybernoz.com/2025/11/'>November 2025</a></li><li><a href='https://cybernoz.com/2025/10/'>October 2025</a></li><li><a href='https://cybernoz.com/2025/09/'>September 2025</a></li><li><a href='https://cybernoz.com/2025/08/'>August 2025</a></li><li><a href='https://cybernoz.com/2025/07/'>July 2025</a></li><li><a href='https://cybernoz.com/2025/06/'>June 2025</a></li><li><a href='https://cybernoz.com/2025/05/'>May 2025</a></li><li><a href='https://cybernoz.com/2025/04/'>April 2025</a></li><li><a href='https://cybernoz.com/2025/03/'>March 2025</a></li><li><a href='https://cybernoz.com/2025/02/'>February 2025</a></li><li><a href='https://cybernoz.com/2025/01/'>January 2025</a></li><li><a href='https://cybernoz.com/2024/12/'>December 2024</a></li><li><a href='https://cybernoz.com/2024/11/'>November 2024</a></li><li><a href='https://cybernoz.com/2024/10/'>October 2024</a></li><li><a href='https://cybernoz.com/2024/09/'>September 2024</a></li><li><a href='https://cybernoz.com/2024/08/'>August 2024</a></li><li><a href='https://cybernoz.com/2024/07/'>July 2024</a></li><li><a href='https://cybernoz.com/2024/06/'>June 2024</a></li><li><a href='https://cybernoz.com/2024/05/'>May 2024</a></li><li><a href='https://cybernoz.com/2024/04/'>April 2024</a></li><li><a href='https://cybernoz.com/2024/03/'>March 2024</a></li><li><a href='https://cybernoz.com/2024/02/'>February 2024</a></li><li><a href='https://cybernoz.com/2024/01/'>January 2024</a></li><li><a href='https://cybernoz.com/2023/12/'>December 2023</a></li><li><a href='https://cybernoz.com/2023/11/'>November 2023</a></li><li><a href='https://cybernoz.com/2023/10/'>October 2023</a></li><li><a href='https://cybernoz.com/2023/09/'>September 2023</a></li><li><a href='https://cybernoz.com/2023/08/'>August 2023</a></li><li><a href='https://cybernoz.com/2023/07/'>July 2023</a></li><li><a href='https://cybernoz.com/2023/06/'>June 2023</a></li><li><a href='https://cybernoz.com/2023/05/'>May 2023</a></li><li><a href='https://cybernoz.com/2023/04/'>April 2023</a></li><li><a href='https://cybernoz.com/2023/03/'>March 2023</a></li><li><a href='https://cybernoz.com/2023/02/'>February 2023</a></li><li><a href='https://cybernoz.com/2023/01/'>January 2023</a></li><li><a href='https://cybernoz.com/2022/12/'>December 2022</a></li></ul></div></div></div></div></div><div class="cn-footer__bottom"><div> © 2026 <strong>Cybernoz</strong>. All rights reserved.</div><div class="cn-footer__social"></div></div></div></footer> <script type="speculationrules">{"prefetch":[{"source":"document","where":{"and":[{"href_matches":"/*"},{"not":{"href_matches":["/wp-*.php","/wp-admin/*","/wp-content/uploads/*","/wp-content/*","/wp-content/plugins/*","/wp-content/themes/cybernoz-theme/*","/*\\?(.+)"]}},{"not":{"selector_matches":"a[rel~=\"nofollow\"]"}},{"not":{"selector_matches":".no-prefetch, .no-prefetch a"}}]},"eagerness":"conservative"}]}</script> <script id="wp-i18n-js-after" type="litespeed/javascript">wp.i18n.setLocaleData({'text direction\u0004ltr':['ltr']})</script> <script id="contact-form-7-js-before" type="litespeed/javascript">var wpcf7={"api":{"root":"https:\/\/cybernoz.com\/wp-json\/","namespace":"contact-form-7\/v1"},"cached":1}</script> <script type="litespeed/javascript" data-src="https://challenges.cloudflare.com/turnstile/v0/api.js" id="cloudflare-turnstile-js" data-wp-strategy="async"></script> <script id="cloudflare-turnstile-js-after" type="litespeed/javascript">document.addEventListener('wpcf7submit',e=>turnstile.reset())</script> <script data-no-optimize="1">window.lazyLoadOptions=Object.assign({},{threshold:300},window.lazyLoadOptions||{});!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?module.exports=e():"function"==typeof define&&define.amd?define(e):(t="undefined"!=typeof globalThis?globalThis:t||self).LazyLoad=e()}(this,function(){"use strict";function e(){return(e=Object.assign||function(t){for(var e=1;e<arguments.length;e++){var n,a=arguments[e];for(n in a)Object.prototype.hasOwnProperty.call(a,n)&&(t[n]=a[n])}return t}).apply(this,arguments)}function o(t){return e({},at,t)}function l(t,e){return t.getAttribute(gt+e)}function c(t){return l(t,vt)}function s(t,e){return function(t,e,n){e=gt+e;null!==n?t.setAttribute(e,n):t.removeAttribute(e)}(t,vt,e)}function i(t){return s(t,null),0}function r(t){return null===c(t)}function u(t){return c(t)===_t}function d(t,e,n,a){t&&(void 0===a?void 0===n?t(e):t(e,n):t(e,n,a))}function f(t,e){et?t.classList.add(e):t.className+=(t.className?" ":"")+e}function _(t,e){et?t.classList.remove(e):t.className=t.className.replace(new RegExp("(^|\\s+)"+e+"(\\s+|$)")," ").replace(/^\s+/,"").replace(/\s+$/,"")}function g(t){return t.llTempImage}function v(t,e){!e||(e=e._observer)&&e.unobserve(t)}function b(t,e){t&&(t.loadingCount+=e)}function p(t,e){t&&(t.toLoadCount=e)}function n(t){for(var e,n=[],a=0;e=t.children[a];a+=1)"SOURCE"===e.tagName&&n.push(e);return n}function h(t,e){(t=t.parentNode)&&"PICTURE"===t.tagName&&n(t).forEach(e)}function a(t,e){n(t).forEach(e)}function m(t){return!!t[lt]}function E(t){return t[lt]}function I(t){return delete t[lt]}function y(e,t){var n;m(e)||(n={},t.forEach(function(t){n[t]=e.getAttribute(t)}),e[lt]=n)}function L(a,t){var o;m(a)&&(o=E(a),t.forEach(function(t){var e,n;e=a,(t=o[n=t])?e.setAttribute(n,t):e.removeAttribute(n)}))}function k(t,e,n){f(t,e.class_loading),s(t,st),n&&(b(n,1),d(e.callback_loading,t,n))}function A(t,e,n){n&&t.setAttribute(e,n)}function O(t,e){A(t,rt,l(t,e.data_sizes)),A(t,it,l(t,e.data_srcset)),A(t,ot,l(t,e.data_src))}function w(t,e,n){var a=l(t,e.data_bg_multi),o=l(t,e.data_bg_multi_hidpi);(a=nt&&o?o:a)&&(t.style.backgroundImage=a,n=n,f(t=t,(e=e).class_applied),s(t,dt),n&&(e.unobserve_completed&&v(t,e),d(e.callback_applied,t,n)))}function x(t,e){!e||0<e.loadingCount||0<e.toLoadCount||d(t.callback_finish,e)}function M(t,e,n){t.addEventListener(e,n),t.llEvLisnrs[e]=n}function N(t){return!!t.llEvLisnrs}function z(t){if(N(t)){var e,n,a=t.llEvLisnrs;for(e in a){var o=a[e];n=e,o=o,t.removeEventListener(n,o)}delete t.llEvLisnrs}}function C(t,e,n){var a;delete t.llTempImage,b(n,-1),(a=n)&&--a.toLoadCount,_(t,e.class_loading),e.unobserve_completed&&v(t,n)}function R(i,r,c){var l=g(i)||i;N(l)||function(t,e,n){N(t)||(t.llEvLisnrs={});var a="VIDEO"===t.tagName?"loadeddata":"load";M(t,a,e),M(t,"error",n)}(l,function(t){var e,n,a,o;n=r,a=c,o=u(e=i),C(e,n,a),f(e,n.class_loaded),s(e,ut),d(n.callback_loaded,e,a),o||x(n,a),z(l)},function(t){var e,n,a,o;n=r,a=c,o=u(e=i),C(e,n,a),f(e,n.class_error),s(e,ft),d(n.callback_error,e,a),o||x(n,a),z(l)})}function T(t,e,n){var a,o,i,r,c;t.llTempImage=document.createElement("IMG"),R(t,e,n),m(c=t)||(c[lt]={backgroundImage:c.style.backgroundImage}),i=n,r=l(a=t,(o=e).data_bg),c=l(a,o.data_bg_hidpi),(r=nt&&c?c:r)&&(a.style.backgroundImage='url("'.concat(r,'")'),g(a).setAttribute(ot,r),k(a,o,i)),w(t,e,n)}function G(t,e,n){var a;R(t,e,n),a=e,e=n,(t=Et[(n=t).tagName])&&(t(n,a),k(n,a,e))}function D(t,e,n){var a;a=t,(-1<It.indexOf(a.tagName)?G:T)(t,e,n)}function S(t,e,n){var a;t.setAttribute("loading","lazy"),R(t,e,n),a=e,(e=Et[(n=t).tagName])&&e(n,a),s(t,_t)}function V(t){t.removeAttribute(ot),t.removeAttribute(it),t.removeAttribute(rt)}function j(t){h(t,function(t){L(t,mt)}),L(t,mt)}function F(t){var e;(e=yt[t.tagName])?e(t):m(e=t)&&(t=E(e),e.style.backgroundImage=t.backgroundImage)}function P(t,e){var n;F(t),n=e,r(e=t)||u(e)||(_(e,n.class_entered),_(e,n.class_exited),_(e,n.class_applied),_(e,n.class_loading),_(e,n.class_loaded),_(e,n.class_error)),i(t),I(t)}function U(t,e,n,a){var o;n.cancel_on_exit&&(c(t)!==st||"IMG"===t.tagName&&(z(t),h(o=t,function(t){V(t)}),V(o),j(t),_(t,n.class_loading),b(a,-1),i(t),d(n.callback_cancel,t,e,a)))}function $(t,e,n,a){var o,i,r=(i=t,0<=bt.indexOf(c(i)));s(t,"entered"),f(t,n.class_entered),_(t,n.class_exited),o=t,i=a,n.unobserve_entered&&v(o,i),d(n.callback_enter,t,e,a),r||D(t,n,a)}function q(t){return t.use_native&&"loading"in HTMLImageElement.prototype}function H(t,o,i){t.forEach(function(t){return(a=t).isIntersecting||0<a.intersectionRatio?$(t.target,t,o,i):(e=t.target,n=t,a=o,t=i,void(r(e)||(f(e,a.class_exited),U(e,n,a,t),d(a.callback_exit,e,n,t))));var e,n,a})}function B(e,n){var t;tt&&!q(e)&&(n._observer=new IntersectionObserver(function(t){H(t,e,n)},{root:(t=e).container===document?null:t.container,rootMargin:t.thresholds||t.threshold+"px"}))}function J(t){return Array.prototype.slice.call(t)}function K(t){return t.container.querySelectorAll(t.elements_selector)}function Q(t){return c(t)===ft}function W(t,e){return e=t||K(e),J(e).filter(r)}function X(e,t){var n;(n=K(e),J(n).filter(Q)).forEach(function(t){_(t,e.class_error),i(t)}),t.update()}function t(t,e){var n,a,t=o(t);this._settings=t,this.loadingCount=0,B(t,this),n=t,a=this,Y&&window.addEventListener("online",function(){X(n,a)}),this.update(e)}var Y="undefined"!=typeof window,Z=Y&&!("onscroll"in window)||"undefined"!=typeof navigator&&/(gle|ing|ro)bot|crawl|spider/i.test(navigator.userAgent),tt=Y&&"IntersectionObserver"in window,et=Y&&"classList"in document.createElement("p"),nt=Y&&1<window.devicePixelRatio,at={elements_selector:".lazy",container:Z||Y?document:null,threshold:300,thresholds:null,data_src:"src",data_srcset:"srcset",data_sizes:"sizes",data_bg:"bg",data_bg_hidpi:"bg-hidpi",data_bg_multi:"bg-multi",data_bg_multi_hidpi:"bg-multi-hidpi",data_poster:"poster",class_applied:"applied",class_loading:"litespeed-loading",class_loaded:"litespeed-loaded",class_error:"error",class_entered:"entered",class_exited:"exited",unobserve_completed:!0,unobserve_entered:!1,cancel_on_exit:!0,callback_enter:null,callback_exit:null,callback_applied:null,callback_loading:null,callback_loaded:null,callback_error:null,callback_finish:null,callback_cancel:null,use_native:!1},ot="src",it="srcset",rt="sizes",ct="poster",lt="llOriginalAttrs",st="loading",ut="loaded",dt="applied",ft="error",_t="native",gt="data-",vt="ll-status",bt=[st,ut,dt,ft],pt=[ot],ht=[ot,ct],mt=[ot,it,rt],Et={IMG:function(t,e){h(t,function(t){y(t,mt),O(t,e)}),y(t,mt),O(t,e)},IFRAME:function(t,e){y(t,pt),A(t,ot,l(t,e.data_src))},VIDEO:function(t,e){a(t,function(t){y(t,pt),A(t,ot,l(t,e.data_src))}),y(t,ht),A(t,ct,l(t,e.data_poster)),A(t,ot,l(t,e.data_src)),t.load()}},It=["IMG","IFRAME","VIDEO"],yt={IMG:j,IFRAME:function(t){L(t,pt)},VIDEO:function(t){a(t,function(t){L(t,pt)}),L(t,ht),t.load()}},Lt=["IMG","IFRAME","VIDEO"];return t.prototype={update:function(t){var e,n,a,o=this._settings,i=W(t,o);{if(p(this,i.length),!Z&&tt)return q(o)?(e=o,n=this,i.forEach(function(t){-1!==Lt.indexOf(t.tagName)&&S(t,e,n)}),void p(n,0)):(t=this._observer,o=i,t.disconnect(),a=t,void o.forEach(function(t){a.observe(t)}));this.loadAll(i)}},destroy:function(){this._observer&&this._observer.disconnect(),K(this._settings).forEach(function(t){I(t)}),delete this._observer,delete this._settings,delete this.loadingCount,delete this.toLoadCount},loadAll:function(t){var e=this,n=this._settings;W(t,n).forEach(function(t){v(t,e),D(t,n,e)})},restoreAll:function(){var e=this._settings;K(e).forEach(function(t){P(t,e)})}},t.load=function(t,e){e=o(e);D(t,e)},t.resetStatus=function(t){i(t)},t}),function(t,e){"use strict";function n(){e.body.classList.add("litespeed_lazyloaded")}function a(){console.log("[LiteSpeed] Start Lazy Load"),o=new LazyLoad(Object.assign({},t.lazyLoadOptions||{},{elements_selector:"[data-lazyloaded]",callback_finish:n})),i=function(){o.update()},t.MutationObserver&&new MutationObserver(i).observe(e.documentElement,{childList:!0,subtree:!0,attributes:!0})}var o,i;t.addEventListener?t.addEventListener("load",a,!1):t.attachEvent("onload",a)}(window,document);</script><script data-no-optimize="1">window.litespeed_ui_events=window.litespeed_ui_events||["mouseover","click","keydown","wheel","touchmove","touchstart"];var urlCreator=window.URL||window.webkitURL;function litespeed_load_delayed_js_force(){console.log("[LiteSpeed] Start Load JS Delayed"),litespeed_ui_events.forEach(e=>{window.removeEventListener(e,litespeed_load_delayed_js_force,{passive:!0})}),document.querySelectorAll("iframe[data-litespeed-src]").forEach(e=>{e.setAttribute("src",e.getAttribute("data-litespeed-src"))}),"loading"==document.readyState?window.addEventListener("DOMContentLoaded",litespeed_load_delayed_js):litespeed_load_delayed_js()}litespeed_ui_events.forEach(e=>{window.addEventListener(e,litespeed_load_delayed_js_force,{passive:!0})});async function litespeed_load_delayed_js(){let t=[];for(var d in document.querySelectorAll('script[type="litespeed/javascript"]').forEach(e=>{t.push(e)}),t)await new Promise(e=>litespeed_load_one(t[d],e));document.dispatchEvent(new Event("DOMContentLiteSpeedLoaded")),window.dispatchEvent(new Event("DOMContentLiteSpeedLoaded"))}function litespeed_load_one(t,e){console.log("[LiteSpeed] Load ",t);var d=document.createElement("script");d.addEventListener("load",e),d.addEventListener("error",e),t.getAttributeNames().forEach(e=>{"type"!=e&&d.setAttribute("data-src"==e?"src":e,t.getAttribute(e))});let a=!(d.type="text/javascript");!d.src&&t.textContent&&(d.src=litespeed_inline2src(t.textContent),a=!0),t.after(d),t.remove(),a&&e()}function litespeed_inline2src(t){try{var d=urlCreator.createObjectURL(new Blob([t.replace(/^(?:<!--)?(.*?)(?:-->)?$/gm,"$1")],{type:"text/javascript"}))}catch(e){d="data:text/javascript;base64,"+btoa(t.replace(/^(?:<!--)?(.*?)(?:-->)?$/gm,"$1"))}return d}</script><script data-no-optimize="1">var litespeed_vary=document.cookie.replace(/(?:(?:^|.*;\s*)_lscache_vary\s*\=\s*([^;]*).*$)|^.*$/,"");litespeed_vary||(sessionStorage.getItem("litespeed_reloaded")?console.log("LiteSpeed: skipping guest vary reload (already reloaded this session)"):fetch("/wp-content/plugins/litespeed-cache/guest.vary.php",{method:"POST",cache:"no-cache",redirect:"follow"}).then(e=>e.json()).then(e=>{console.log(e),e.hasOwnProperty("reload")&&"yes"==e.reload&&(sessionStorage.setItem("litespeed_docref",document.referrer),sessionStorage.setItem("litespeed_reloaded","1"),window.location.reload(!0))}));</script><script data-optimized="1" type="litespeed/javascript" data-src="https://js.cybernoz.com/wp-content/litespeed/js/607a720420d1a125ebaaf88a388205ff.js?ver=d34df"></script></body></html> <!-- Page optimized by LiteSpeed Cache @2026-05-21 04:22:25 --> <!-- Page cached by LiteSpeed Cache 7.8.1 on 2026-05-21 04:22:25 --> <!-- Guest Mode --> <!-- QUIC.cloud UCSS in queue -->